mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-26 05:34:13 +08:00
b30ab0e034
On encrypt, we will re-assign the buffer_heads to point to a bounce page rather than the control_page (which is the original page to write that contains the plaintext). The block I/O occurs against the bounce page. On write completion, we re-assign the buffer_heads to the original plaintext page. On decrypt, we will attach a read completion callback to the bio struct. This read completion will decrypt the read contents in-place prior to setting the page up-to-date. The current encryption mode, AES-256-XTS, lacks cryptographic integrity. AES-256-GCM is in-plan, but we will need to devise a mechanism for handling the integrity data. Signed-off-by: Michael Halcrow <mhalcrow@google.com> Signed-off-by: Ildar Muslukhov <ildarm@google.com> Signed-off-by: Theodore Ts'o <tytso@mit.edu>
16 lines
553 B
Makefile
16 lines
553 B
Makefile
#
|
|
# Makefile for the linux ext4-filesystem routines.
|
|
#
|
|
|
|
obj-$(CONFIG_EXT4_FS) += ext4.o
|
|
|
|
ext4-y := balloc.o bitmap.o dir.o file.o fsync.o ialloc.o inode.o page-io.o \
|
|
ioctl.o namei.o super.o symlink.o hash.o resize.o extents.o \
|
|
ext4_jbd2.o migrate.o mballoc.o block_validity.o move_extent.o \
|
|
mmp.o indirect.o extents_status.o xattr.o xattr_user.o \
|
|
xattr_trusted.o inline.o readpage.o
|
|
|
|
ext4-$(CONFIG_EXT4_FS_POSIX_ACL) += acl.o
|
|
ext4-$(CONFIG_EXT4_FS_SECURITY) += xattr_security.o
|
|
ext4-$(CONFIG_EXT4_FS_ENCRYPTION) += crypto_policy.o crypto.o
|